checking.
Once upon a time, Raju Mathur <[EMAIL PROTECTED]> found a keyboard. And typed:
>[All 2.4 kernels upto and including 2.4.3 are vulnerable.  Please
>upgrade as soon as 2.4.4 is released -- Raju]
>
>This is an RFC 1153 digest.
>(1 message)
>----------------------------------------------------------------------
>
>Return-Path: <[EMAIL PROTECTED]>
>Approved-By: [EMAIL PROTECTED]
>Delivered-To: [EMAIL PROTECTED]
>Mime-version: 1.0
>Content-type: text/plain; charset="iso-8859-1"
>Approved: [EMAIL PROTECTED]
>Message-ID:  <[EMAIL PROTECTED]>
>Reply-To: [EMAIL PROTECTED]
>X-To:         [EMAIL PROTECTED]
>X-cc:         [EMAIL PROTECTED]
>Content-Transfer-Encoding: 8bit
>X-MIME-Autoconverted: from quoted-printable to 8bit by biznetindia.com id f3K9IIB05215
>From: [EMAIL PROTECTED]
>Sender: Bugtraq List <[EMAIL PROTECTED]>
>To: [EMAIL PROTECTED]
>Subject:      [RHSA-2001:052-02] FTP iptables vulnerability in 2.4 kernel
>Date:         Thu, 19 Apr 2001 16:00:00 -0400
>
>---------------------------------------------------------------------
>                   Red Hat, Inc. Red Hat Security Advisory
>
>Synopsis:          FTP iptables vulnerability in 2.4 kernel
>Advisory ID:       RHSA-2001:052-02
>Issue date:        2001-04-19
>Updated on:        2001-04-19
>Product:           Red Hat Linux
>Keywords:          FTP iptables ip_conntrack_ftp
>Cross references:  
>Obsoletes:         
>---------------------------------------------------------------------
>
>1. Topic:
>
>A security hole has been found that does not affect the default
>configuration of Red Hat Linux, but can affect some custom
>configurations of Red Hat Linux 7.1 only.  The bug is specific
>to the Linux 2.4 kernel series.
>
>2. Relevant releases/architectures:
>
>
>
>3. Problem description:
>
>A vulnerability in iptables "RELATED" connection tracking has been
>discovered.  When using iptables to allow FTP "RELATED" connections
>through the firewall, carefully constructed PORT commands can open
>arbitrary holes in the firewall.
>
>The iptables system is included in the 2.4 kernel series, but not in
>the earlier 2.2 kernel series used in Red Hat Linux 6.x and Red Hat
>Linux 7.0.
>
>Red Hat Linux 7.1 uses a 2.4 kernel and provides the ip_conntrack_ftp
>module that has this bug.  However, Red Hat Linux does not currently
>configure iptables (the default firewall configuration uses ipchains
>instead), so unless you have explicitly configured iptables and
>enabled FTP "RELATED" connections through the firewall, you are not
>vulnerable to attack.
>
>4. Solution:
>
>Red Hat will be releasing a kernel with this and other bugs fixed
>shortly.  In the meantime, we strongly recommend that users of
>iptables not allow FTP "RELATED" connections.
>
>5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
>
>
>
>6. RPMs required:
>
>
>
>7. Verification:
>
>MD5 sum                           Package Name
>--------------------------------------------------------------------------
>
>
>These packages are GPG signed by Red Hat, Inc. for security.  Our key
>is available at:
>    http://www.redhat.com/corp/contact.html
>
>You can verify each package with the following command:
>    rpm --checksig  <filename>
>
>If you only wish to verify that each package has not been corrupted or
>tampered with, examine only the md5sum with the following command:
>    rpm --checksig --nogpg <filename>
>
>8. References:
>
>http://www.tempest.com.br/advisories/01-2001.html
>http://www.securityfocus.com/templates/archive.pike?list=1&mid=177070
>http://slashdot.org/comments.pl?sid=01/04/19/047249&cid=36
>
>
>Copyright(c) 2000, 2001 Red Hat, Inc.
>
>------------------------------
>
>End of this Digest
>******************
>
>-- 
>Raju Mathur          [EMAIL PROTECTED]           http://kandalaya.org/
>
>----------------------------------------------
>An alpha version of a web based tool to manage
>your subscription with this mailing list is at
>http://lists.linux-india.org/cgi-bin/mj_wwwusr
>
========End of Original Message=============Know Gnu, Know Freedom=

-- 
Regards,

V Suresh.

Mail: [EMAIL PROTECTED]    URL: www16.brinkster.com/vsuresh 

        ......................................................
        .Debian GNU/Linux Potato - The Soul of My GNU Machine.
                  ......................................................


  9:33pm  up 23 min,  5 users,  load average: 1.00, 0.99, 0.75

----------------------------------------------
The mailing list archives are available at
http://lists.linux-india.org/cgi-bin/wilma/linux-india-help

Reply via email to